3nd International Conference on Risks and Security of Internet and Systems (CRiSIS 2008)

 

 

 

Final Programme (pdf )

 

Monday  
27 October 2008

Tuesday 
28  October 2008

Wednesday
  29 October 2008

 Thursday
30 October 2008

08h:00

 

 

 

Registration

 

 

08h:30

 

 

 

Session R3

Regular papers

Session R4

Regular papers

Session R5

Regular papers

Session R6

Regular papers  

09h:00

 

 

 

Welcome

09h:30

 

 

 

Keynote lecture

10h:00

 

 

 

Keynote Lecture

10h:30

 

 

 

Coffee Break

Coffee Break

11h:00

 

 

 

Session R1

Regular papers

Session R2

Regular papers

Coffee Break

Session R7

Regular papers

Session R8

Regular papers

11h:30

 

 

 

Session S1

Short papers

Session S2

Short papers

12h:00

 

 

 

12h:30

 

 

 

13h:00

 

 

 

Lunch

Closing ceremony

13h:30

 

 

 

Lunch

Lunch

14h:00

 

 

 

14h:30

Registration

15h:00

Tutorial

Dessert excursion

Villages Berbères & Charmes des Oasis

 

15h:30

16h:00

16h:30

Coffee Break

17h:00

Tutorial

17h:30

18h:00

 

 

Conference Banquet

Planet Oasis

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

aaa

 

CRiSIS'2008 Programme

 

Monday 27 October 2008

14h30-18h30

Registration

Tuesday 28 October 2008

8h30-9h00

Registration 

9h00-9h30 

Welcome

9h30-10h30

Keynote lecture

«Critical Infrastructures Security Modeling, Enforcement and Runtime Checking »
Anas Abou ElKalam
ENSEEIHT, Toulouse

10h30-11h00

Coffee Break

11h00-13h00

Session R1:  Regular Papers
«Formal approaches for security»


An Algebraic-Functional Framework for Distributed Access Control
Clara Bertolissi, Maribel Fernandez

Aspect-based Enforcement of Formal Delegation Policies
Slim Kallel, Anis Charfi, Mira Mezini, Mohamed jmaiel

Access Control for Collaborative Systems: A Comparative Analysis
amine baina, Yves Deswarte, Anas Abou El Kalam, Mohamed Kaaniche

An ontology-based approach to react to network attacks
Nora Cuppens-Boulahia, Frederic Cuppens, Jorge E. López de Vergara, Enrique Vazquez, Javier Guerra, Hervé Debar

11h00-13h00

Session R2: Regular Papers
« Intrusion detection and web security »

Anomaly based Intrusion detection using Distributed Intelligent systems
Benoit More

Un mécanisme de détection d'intrusions adaptative à base d’agents
Mohamed Cheikh, Salima Hacini, Zizette Boufaida

Policy-Based Intrusion Detection in Web Applications by Monitoring Java Information Flows
Guillaume Hiet, Valérie Viet Triem Tong, Ludovic Me, Benjamin Morin

Efficient Detection of DDoS Attacks with Important Attributes
Wei Wang, Sylvain Gombault

13h00-15h00

Lunch

 

Tutorial part 1

« Securing the Service Oriented Infrastructure: Solutions supporting the secure integration of services across Enterprises »
David Brossard, BT Security Research Centre
Theo Dimitrakos, BT Security Research Centre

16h30-17h00

Coffee Break

17h00-18h30

Tutorial part 2

« Securing the Service Oriented Infrastructure: Solutions supporting the secure integration of services across Enterprises »
David Brossard, BT Security Research Centre
Theo Dimitrakos, BT Security Research Centre

Wednesday 29 October 2008

8h30-10h00

Session R3: Regular Papers
« Formal method and agent security »

A Formal Security Framework for Mobile Agent Systems: Specification and Verification
Monia Loulou, Ahmed Hadj Kacem, Mohamed Mosbah, mohamed Jmaiel

Verification of Workflow Processes under Multilevel Security Considerations
Kamel Barkaoui, Rahma Ben Ayed, Hanifa Boucheneb, Awatef Hicheur

If only I can trust my police! SIM : an agent-based audit solution of access right deployment through open network
Christophe Incoul, Benjamin GATEAU, Jocelyn Aubert, Nicolas Bounoughaz, Christophe Feltus

8h30-10h00

Session R4: Regular Papers
« Dependability analysis»

Security Analysis of the Dependability, Security, Reconfigurability Framework
Tim Hartog, Geert Kleinhuis

Analysis of Peer-to-Peer Networks from a Dependability Perspective

Hakem Beitollahi, Geert Deconinck

A Byzantine Solution to Early Detect Massive Attacks

Khaled Barbaria, Belhassen Zouari

10h00-11h00

Keynote lecture

«Securing the Service Oriented Infrastructure: research challenges and experiences »
Dr. Theo Dimitrakos, BT Security Research Centre

11h00-11h30

Coffee Break

11h30-13h30 

Session S1: Short papers
 « Security techniques: case studies »


An extended UML Activity Diagram for composing Grid Services
Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed

Case Study: Using Digital Signatures for the Archival of Medical Records in Hospitals
Sebastian Sageder, Johannes Sametinger, Andreas Wiesauer

VisAA: Visual Analyzer for Assembler
Philippe Andouard, Olivier Ly, Davy Rouillard

Revisiting Enforceable Security Policies
Naoyuki Nagatou

Firewalls Anomalies’ Detection System based on  Web Services / Mobile Agents Interactions
Fakher Ben Ftima, Kamel Karoui,Henda Ben Ghzela

11h30-13h30 

Session S2: Short papers
 « MANET and network security »

Towards a New User Anonymity Preserving Protocol (APP) for MANETs
Nadia Chalabi, Mhamed Abdallah, Belhadri Messabih

Formal Procedural Security Modeling and Analysis
Komminist Weldemariam, Adolfo Villafiorita

A new covert channel in WIFI networks
Lilia Frikha, Zouheir Trabelsi

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks
Hakem Beitollahi, Geert Deconinck

Towards an Automated Firewall Security Policies Validation Process
Ryma Abassi, Sihem Guemara El Fatmi

13h30—15h00

Lunch

Desert Excursion

Villages Berbères &
Charmes des Oasis

Thursday 30 October 2008

8h30-10h30

Session R5: Regular Papers
« Anonymous authentication and privacy »

Automated Reaction based on Risk Analysis and Attackers Skills in Intrusion Detection Systems
Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, José Araujo

Towards a Robust Privacy and Anonymity Preserving Architecture for Ubiquitous Computing
Pierre E. ABI-CHAR, Mounir Moukhtari, abdallah MHAMED, Bachar EL-HASSAN

A comparative study of secret code variants in terms of keystroke dynamics
narainsamy pavaday, K.M.S Soyjaudah

8h30-10h30

Session R6: Regular Papers
« QoS for security management »

Reputation based clustering algorithm for security management in ad hoc networks with liars
Mohamed Elhoucine Elhdhili, Lamia Ben Azzouz, Farouk Kamoun

Quality Assurance of Grid Service Provisioning  by Risk Aware Managing of Resource Failures
Axel Keller, Kerstin Voss, Dominic Battré, Matthias Hovestadt, Odej Kao

EESP: A Security Protocol that Supports QoS Management
Mahmoud Mostafa, Anas Abou El Kalam, Christian Fraboul

10h30-11h00

Coffee Break

11h00-12h30 

Session R7: Regular Papers 
« Security in Sensor Networks »

Vers un protocole de routage sécurisé et efficace pour les réseaux de capteurs sans fil hiérarchiques distribués
Abderrahmen Guermazi, Rahma Benayed, Jean-Frederic Myoupo

Economic-based vs. Nature-inspired Intruder Detection in Sensor Networks
Fatma Mili, Swapna Ghanekar, Nancy Alrajei

11h00-12h30 

Session R8: Regular Papers 
« Cryptography and electronic vote »

Apport de la cryptographie elliptique dans le vote électronique
Yousfi Souheib, Bonnecaze Alexis, Riadh Robbana

Application Framework for High Security Requirements in R&D Environments Based on Quantum Cryptography
Christian Kollmitzer, Oliver Maurhart, Stefan Rass, Stefan Schauer

New timestamping schemes in the bounded storage model
Essia BEN SHIL, Kaouther BLIBECH, Riadh Robbana

12h30-13h00

Closing Ceremony

13h00-15h00 

Lunch

 

 

 

 

 
IEEE Xplore-compatible PDF Submission
Pdf Express
 
Final programme is now available

Invited Speakers

Anas Abou ElKalam ENSEEIHT, Toulouse

Dr. Theo Dimitrakos
BT Security Research Centre

CRiSIS is Sponsored by IEEE - Tunisia
IEEE Tunisia
Venue & Hotel
CRiSIS 2008 will take place at "Ras El Aïn Tozeur " Hotel

A special Issue of IJICS
for selected papers

A special Issue of SEE e-STA for selected papers


Important Dates


Full Papers Submission:
May 19 , 2008

Authors Notification:
June 25 , 2008

Camera-Ready Due:
July 15
, 2008

 

 

Fsegs Enis Ansi

Asa

LaBRI RedCad

SEE